Operations | Monitoring | ITSM | DevOps | Cloud

Investigating an '[Object] not found' error in Next.js with Tracing in Sentry

Breakpoints and console.log statements might save your sanity during local dev, but production issues are another story. In prod, your errors might be distributed across different microservices, or hidden in minified code. Good luck hunting those down. That’s where Sentry’s traces and spans come in, offering you easy visibility into every network request, API call, DB fetch and more in a full-stack, distributed environment.

Why Do You Need a Redis Monitor in Place?

Redis Monitor is a simple yet powerful command-line tool that displays every command processed by a Redis server in real-time. It provides visibility into exactly what’s happening inside a Redis instance as it happens. Running a single command can uncover hidden performance issues: The output reveals thousands of unexpected HGETALL operations on a key that should be accessed infrequently. This exposes a Redis call inside a loop, causing unnecessary database strain.

When Should You Enable Trace-Level Logging?

There’s nothing like debugging a broken system at 2 AM, running on caffeine and frustration. When everything’s on fire, logs are your lifeline. That’s where trace-level logging comes in. Unlike standard logs, it captures the step-by-step execution of your code—think of it as the difference between a crime report and full CCTV footage. But more logs don’t always mean better debugging. Too much detail, and you’re drowning; too little, and you’re guessing.

Spotlight on Reference Tables Add Custom Metadata in Datadog! #Datadog #TMiDD #TechTips

This month we’re putting the spotlight on Reference Tables, which is now generally available and enables teams to add custom metadata to their existing Datadog telemetry. Check out the link in our bio to watch the new episode of This Month in Datadog.

The future of Kubernetes networking: Cilium and other CNIs with Canonical Kubernetes

Choosing the right Container Network Interface (CNI) for Kubernetes is critical to achieving optimal performance, security, and scalability. With the launch of Canonical Kubernetes LTS (long-term support) last month, Canonical decided to integrate Cilium as the default CNI in order to reflect our commitment to delivering a modern, security-maintained, high-performance Kubernetes experience.

How does MongoDB work?

Data is essential for gaining a competitive advantage in business. It has the power to reveal new insights that offer opportunities for profit, efficiency, and operational scaling. This is why organizations of all sizes and industries are eager to leverage data for an edge in the marketplace. However, working with data can be challenging for many businesses due to various obstacles like database storage scalability, security, and compliance.

Icinga 2 Insights With Event Streams

There are many ways to interact with the data that Icinga 2 collects, processes, and produces. The most common is probably Icinga Web, which displays checks in all the colors of a traffic light. Icinga 2 also comes with several metrics or performance data writers. But that is not all. Icinga 2 has open interfaces to integrate all kinds of third-party tools if one is not afraid to write a little glue code.

DataDog vs Cloudwatch - Choosing the Right Monitoring Tool

With the increasing complexity of modern applications and cloud infrastructures, monitoring and observability have become essential for maintaining performance, reliability, and security. Organizations need tools that provide actionable insights into their systems, enabling them to detect issues early and optimize resource usage. Two leading monitoring solutions in the market today are Datadog and Amazon CloudWatch.